Chapter 3: Advanced Computer Hardware

Chapter 3: Advanced Computer Hardware

Chapter 3: Advanced Computer Hardware IT Essentials v7.0 ITE v7.0 1 Chapter 3 - Sections & Objectives . 3.1 Boot the Computer . Configure BIOS and UEFI Settings – Describe POST, BIOS, CMOS and UEFI. – Configure the computer firmware. 3.2 Electrical Power . Explain electrical power – Describe wattage and voltage. – Explain power fluctuations and devices that protect against damage caused by fluctuations. ITE v7.0 2 Chapter 3 - Sections & Objectives . 3.3 Advanced Computer Functionality . Explain computer functionality – Explain CPU architecture. – Describe RAID. – Describe common ports, cables, and connectors. – Describe monitor characteristics. 3.4 Computer Upgrade . Select components to upgrade a computer to meet requirements – Select appropriate components to upgrade a computer. – Select components for specialized computers. ITE v7.0 3 Chapter 3 - Sections & Objectives . 3.5 Protecting the Environment . Explain safe disposal methods to protect the environment – Explain safe disposal methods. ITE v7.0 4 3.1 BOOT THE COMPUTER ITE v7.0 5 POST . When a computer is booted, the basic input/output system (BIOS) performs a hardware check on all internal components of the computer. • This check is called a power-on self-test (POST). If a device is malfunctioning, an error or a beep code alerts the technician of the problem. BIOS manufacturers use different codes to indicate different hardware problems. • Motherboard manufacturers may use different beep codes. • Always consult the motherboard documentation to get the beep codes for your computer. To access the BIOS, press the specified key during POST. Installation Tip: To determine if POST is working properly, remove all of the RAM modules from the computer and power it on. The computer should emit the beep code for a computer with no RAM installed. ITE v7.0 6 BIOS and CMOS . All motherboards need a BIOS to operate. BIOS is a ROM chip on the motherboard that contains a small program that controls the communication between the operating system and the hardware. Along with the POST, BIOS also identifies: • Which drives are available • Which drives are bootable • How the memory is configured and when it can be used • How PCIe and PCI expansion slots are configured • How SATA and USB ports are configured • Motherboard power management features ITE v7.0 7 BIOS and CMOS . The motherboard BIOS settings are saved in a Complementary Metal Oxide Semiconductor (CMOS) memory chip. When a computer boots, the BIOS software reads the configured settings stored in CMOS to determine how to configure the hardware. The BIOS settings are retained by CMOS using a battery. If the battery fails, settings can be lost. Installation Tip: If the computer’s time and date are incorrect, it could indicate that the CMOS battery is bad or is getting very low. ITE v7.0 8 UEFI . Most computers today run Unified Extensible Firmware Interface (UEFI). All new computers come with UEFI, which provides additional features and addresses security issues with legacy BIOS. UEFI can run on 32-bit and 64-bit systems, supports larger boot drives, and includes additional features such as secure boot. • Secure boot ensures your computer boots to your specified operating system. • This helps prevent rootkits from taking over the system. ITE v7.0 9 BIOS and UEFI Security . The legacy BIOS supports some security features to protect the BIOS setting, however UEFI adds additional security features. Some common security features found in the BIOS/UEFI systems includes: • Passwords - Passwords allow for different levels of access to the BIOS settings. • Drive encryption - A hard drive can be encrypted to prevent data theft. It prevents data from being read from a hard drive even if the hard drive is moved to another computer • LoJack – This is a security feature that allows the owner to locate, lock, or delete all files from the device. • Trusted Platform Module (TPM) – This is a chip designed to secure hardware by storing encryption keys, digital certificates, passwords, and data. • Secure boot - Secure Boot is a UEFI security standard that ensures that a computer only boots an OS that is trusted by the motherboard manufacturer. ITE v7.0 10 Update the Firmware . Motherboard manufacturers may publish updated BIOS versions to provide enhancements to system stability, compatibility, and performance. Early computer BIOS information was contained in ROM chips and to upgrade the BIOS information, the ROM chip had to be physically replaced. Modern BIOS chips are Electronically Erasable Programmable Read Only Memory (EEPROM) which can be upgraded by the user without opening the computer case. • This is called flashing the BIOS. To download a new BIOS, consult the manufacturer’s website and follow the recommended installation procedures. ITE v7.0 11 3.2 ELECTRICAL POWER ITE v7.0 12 Procedures to Protect Equipment and Data . Electrostatic Discharge (ESD) • Buildup of an electric charge resting on a surface • 30 volts of static electricity can damage a computer component. • ESD can cause damage to computer equipment if not discharged properly. • ESD can build up on you as you walk on a carpeted floor. • Low levels of humidity increase ESD • Use a grounded mat on the workbench and a correctly connect antistatic write strap. ITE v7.0 13 Procedures to Protect Equipment and Data . Electromagnetic Interference (EMI) • Intrusion of outside electromagnetic signals in a transmission media, such as copper cabling • Sources can be: Man-made, natural events, climate or any source designed to generate electromagnetic energy. • EMI distorts the signals, degrading computer communication. • EMI can be generated by large motors, power lines, electrical storms, or any other source of electromagnetic energy. ITE v7.0 14 Procedures to Protect Equipment and Data . Radio Frequency Interference (RFI) • Wireless networks are affected by RFI. • RFI is caused by radio transmitters transmitting in the same frequency. ITE v7.0 15 Wattage and Voltage . There are four basic units of electricity that a computer technician must know: • Voltage (V) – Measured in Volts (V) – The measure of work required to move a charge. • Current (I) – Measured in Amperes(A) – The measure of the amount of electrons moving through a circuit per second. • Resistance (R) – Measured in Ohms ( ) – Refers to the opposition to the flow of current in a circuit. • Power (P) – Measured in Watts (W) –The measure of the work required to move electrons through a circuit multiplied by the number of electrons going through the circuit per second. A basic equation, known as Ohm's Law, expresses how voltage is equal to the current multiplied by the resistance: V = IR or V = A . In an electrical system, power is equal to the voltage multiplied by the current: P = VI or W = VA. ITE v7.0 16 Power Supply Voltage Settings . On the back of some power supplies is a small switch called the voltage selector switch. • This switch sets the input voltage to the power supply to either 110V / 115V or 220V / 230V. • A power supply with this switch is called a dual voltage power supply. • If a power supply does not have this switch, it automatically detects and sets the correct voltage. The correct voltage setting is determined by the country where the power supply is used. ITE v7.0 17 Power Fluctuation Types . When the voltage in a computer is not accurate or steady, computer components might not operate correctly. The following types of AC power fluctuations can cause data loss or hardware failure: • Blackout - Complete loss of AC power. • Brownout - Reduced voltage level of AC power that lasts for a period of time. • Noise - Interference from generators and lightning. • Spike - Sudden increase in voltage that lasts for a short period and exceeds 100 percent of the normal voltage on a line. • Power surge - Dramatic increase in voltage above the normal flow of electrical current. ITE v7.0 18 Power Protection Devices . To help shield against power fluctuation problems, use devices to protect the data and computer equipment: • Surge protector - Helps protect against damage from surges and spikes. • Surge suppressor diverts extra electrical voltage that is on the line to the ground. • Uninterruptible power supply (UPS) - Helps protect against potential electrical power problems and provides a consistent quality of power when brownouts and blackouts occur. – Equipment runs on the battery all the time and AC keeps it charged. • Standby power supply (SPS) - Helps protect against potential electrical power problems by providing a backup battery that is on standby during normal operation. – This device is not as reliable as a UPS because of the time it takes to switch over to the battery. Laser printers should not be plugged to a UPS or SPS. ITE v7.0 19 3.3 ADVANCED COMPUTER FUNCTIONALITY ITE v7.0 20 CPU Architectures . A program is a sequence of stored instructions and a CPU executes these instructions by following a specific instruction set. There are two distinct types of instruction sets that CPUs may use: • Reduced Instruction Set Computer (RISC) - This architecture uses a relatively small set of instructions. RISC chips are designed to execute these instructions very rapidly. • Complex Instruction Set Computer (CISC) - This architecture uses a broad set of instructions, resulting in fewer steps per operation. While the CPU is executing one step of the program, the remaining instructions and the data are stored nearby in a special, high-speed memory, called cache. ITE v7.0 21 Enhancing CPU Operation . Intel processors use Hyper-Threading to enhance the performance of some of their CPUs. • With Hyper-Threading, multiple pieces of code (threads) are executed simultaneously in the CPU so a single CPU performs as though there are two CPUs. AMD processors use HyperTransport to enhance CPU performance. • HyperTransport is a high-speed connection between the CPU and the Northbridge chip. The power of a CPU is measured by the speed and the amount of data that it can process.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    67 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us